DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Tutorials

10 steps to clean up your digital footprint

by Sophie C.

Reading Time: 5 mins read
in Tutorials

 

1. Do a full name search into several search engines

Search for your first and last name using multiple search engines, such as Google, Bing, DuckDuckGo. If you’ve recently changed your name, look up both your old and new names. Try some of the most common misspellings as well.

2. Remove yourself from data broker websites

If you’ve ever purchased something online, scanned a QR code, or given out your email address when signing up for a service, data brokers have most likely sold your information to third parties (Credit reports, background checks). After doing a search of your name, you will see which websites show up in the results. Visit the website and follow the site’s procedures to have your information removed.
Most data broker websites offer a manual opt-out option, so if you’re worried about your online privacy, you can work to remove your information from them one by one. You could also do a search for your name on the most popular sites like Whitepages, Intelius, TruthFinder, Instant Checkmate, and PeopleFinders to check if those companies have anything about you.

3. Audit your accounts

Perform an audit of the online accounts or profiles that you have created. Most people have created multiple accounts over time, whether for gaming or online shopping. You can check if you created accounts for the most popular websites and make a list of them.
You can also search in your email inbox for those popular websites and see if you receive emails from them. If you do, you most likely have an account with them. Make sure to check if your email address has been compromised in a breach so you can take proper action.

Monitor Firefox by Mozilla can be a great tool.

4. Delete old email and unused accounts

Deactivate or delete all the social media profiles, subscriptions, web services and shopping accounts, you are not using anymore.
In the case you have forgotten your username, search through your email inboxes to find emails from those websites. Most of them will have a process you can follow to retrieve your account details. Remember that some content can never be completely removed, so next time you are about to create an account think about this.

5. Use unique passwords for every online service

Create a password with at least ten numbers, symbols, and upper- and lowercase letters whenever you need one. Avoid using common words because password cracking tools can attempt to access your password using any word in the dictionary.
It is important to separate create unique passwords for each account to make it more difficult for your personal information to be leaked and reused.
If remembering different passwords for multiple websites is difficult for you, a password manager be the best option for you. They will also generate complex and unique passwords for all of your favorite websites.

6. Sign out of all apps and sites you’ve previously used or visited

Regardless of whether you only used them once, and that was years ago, you’re probably still logged into multiple online accounts, which can pose an online privacy risk. If you’ve used Facebook or Google to sign in to any apps, now’s the time to remove access, this way you will be protecting your personal info in case of data breaches. For Facebook, go to Settings and then click on “Apps and websites,” then “Logged in with Facebook.”
In Gmail, click your user icon on the top right, then click “My Account” and “Apps connected to your account.”

7. Clear your browser history, delete and deny cookies and install adblockers

Clearing your browsing history and cookies on a regular basis is a good idea. This way you will be deleting unwanted cookies and trackers that may follow you around the web. Use the browser’s cookie settings to let websites know you do not want to be tracked. In Google Chrome, you can find this in the settings by clicking “Privacy and Security” and then “Cookies and other site data.” Check – Send a “Do Not Track” request with your browsing traffic.

Apple and Google, for example, will let you delete your entire history, stored private data, and any associated email accounts. Enter your account settings by clicking on your username, then look around and delete any and all information and data you find.
You can also use services to hide your browsing habits from websites, trackers, and, in some cases, your ISP. A VPN can be a great option, and using services like Private Relay and Hide My Email on your Apple devices can also help.

Ad blockers will prevent you from signing up for promotions, newsletters, and phishing schemes where they will collect your information and use it against you. There’s Ad Block Plus that works on Chrome, Mozilla, Android and iOS.

8. Make social media accounts and your location private

Make your Facebook, Twitter, Instagram, and other social media profiles private so that only your friends can see what you post (and not potential employers). Adjust your security settings to control who can see the content you post or places you’ve visited. If you want to stay private, make sure your security and privacy settings on your profiles are properly configured.

Check the privacy settings on the websites you identified in step 3 to make sure they are appropriate for your needs. For the apps and accounts you’ve decided to keep activated, limit the data they collect by managing your location settings. Turn off location services on Android and turn off location tracking on an iPhone.

Make sure no other apps are monitoring your location. Facebook’s Nearby Friends tool is still around—and can still track you, as well as any COVID-19 application that maybe sharing information which could lead to location tracking,

9. Unsubscribe to unwanted newsletters and sales alerts

Unsubscribe from unwanted newsletters and mailing lists. If you have closed any account, you should also make sure to unsubscribe from their mailing lists. You can unsubscribe as they arrive in your inbox (unsubscribe link at the bottom of the email), or search your inbox for terms like “newsletter” and “offer.”

10. Build your reputation through good behavior

Be mindful before sharing or resharing negative content. Words and ideas can become yours when you repost them. Use caution when joking about sensitive topics such as race, religion, and politics. Remember that some people have different levels of online privacy than you when you post original photos. Before you tag others online or ask your friends to tag themselves, get their permission first. Don’t post anything that you don’t want to come back and haunt you in the future.

Consider the effect your online behavior could have on you and others in the long term. It is important to recognize your digital identity and take advantage of online networking opportunities. Repeat the preceding 9 steps every few months to clean up your digital footprint regularly.

Remember the internet never forgets. Furthermore, keeping track of your digital footprint isn’t just about your reputation, the data you allow your devices to collect also jeopardizes your internet privacy and security.

10 steps to clean up your digital footprint from Cybermaterial
Tags: Digital FootprintTutorialTutorials
ADVERTISEMENT

Related Posts

How To Block Scam Calls – Tutorial

How To Block Scam Calls – Tutorial

March 24, 2023
How to assess the security of your email?

How to assess the security of your email?

March 16, 2023
How to create aliases to protect your real email on Microsoft Outloook

How to create aliases to protect your real email on Microsoft Outloook

March 13, 2023
How To Use ProtonVPN To Browse The Internet

How To Use ProtonVPN To Browse The Internet

March 8, 2023

More Articles

Course

DevSecOps – Integrating Security into DevOps

March 31, 2022
Alerts

CISA Releases Security Advisory for Philips Vue PAC Products

July 6, 2021
Alerts

HPE security advisory (AV22-308)

June 7, 2022
Book

Cybersecurity for Beginners: 25 MOST COMMON SECURITY THREATS

May 14, 2021

Bulgaria hit by cyber attack

October 17, 2022
Vendors

Trellix

October 26, 2022
Alerts

CISA Releases ESXiArgs Ransomware Recovery Script

February 8, 2023
Document

Assessing The Risk of Compromised Credentials to The Enterprise

April 19, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.